Introduction
SecureAuth IdP RADIUS server lets you configure two-factor authentication login access to a VPN and remote resources via RADIUS. This optional component of the SecureAuth IdP product is typically installed on a stand-alone server or on a SecureAuth IdP appliance.
Using the RADIUS feature, enterprises can provide strong adaptive authentication for RADIUS clients, such as VPNs and other applications, that leverage RADIUS for two-factor authentication used with SecureAuth® Identity Platform and SecureAuth IdP.
See the Release notes to learn about new features, enhancements, resolved issues, and known issues.
SecureAuth has changed the product versioning scheme. SecureAuth RADIUS v2.5 was the previous version; v2.5 and earlier version increments will not change. The scheme from the current version and later will be based on the year, month, and point release (.01) or feature release (1) number.
Example: The current version is v19.06, which stands for the year (19) and month (06) of the release. This is a new version, so there is no point or feature release number.
See SecureAuth IdP RADIUS server v2.5 integration guide for information about the previous product release.
This document is organized into four parts:
- Topics in this guide include:
- Installation – see Installation guide - v19.06 - SecureAuth IdP RADIUS server
- Configuration – see Configuration guide - v19.06 - SecureAuth IdP RADIUS server
- End-user experience – see End-user experience - v19.06 - SecureAuth IdP RADIUS server
Prerequisites
- SecureAuth IdP version 9.1 or later
- Authentication API (v9.1+) configured and enabled on the realm
Supported SecureAuth IdP components and integrated components
SecureAuth IdP features | SecureAuth IdP version | Configuration notes | ||||||||||||||||
Adaptive Authentication | Configure threat checking for:
| |||||||||||||||||
Push-to-Accept | ||||||||||||||||||
Attribute Mapping | Configure and enable Identity Management API (v9.1+) on the realm to grant / deny end user login access. Group based authentication – Optionally configure Membership Connection Settings to grant / deny login access:
| |||||||||||||||||
UPN Logon | ||||||||||||||||||
Multi-Factor Authentication methods | SecureAuth IdP version | SecureAuth IdP v9.x supported server and required components | ||||||||||||||||
Time-based One-Time Passcode (TOTP) | v9.1+ | NetMotion Wireless VPN:
NOTE: Refer to the NetMotion Mobility RADIUS configuration guide. | ||||||||||||||||
HMAC-based One-Time Passcode (HOTP) | v9.1+ | |||||||||||||||||
SMS (OTP only) | v9.1+ | |||||||||||||||||
Phone | v9.1+ | |||||||||||||||||
Email (OTP only) | v9.1+ | |||||||||||||||||
Passcode OTP (Push Notification) | v9.1+ | |||||||||||||||||
Mobile Login Request | v9.1+ | |||||||||||||||||
PIN | v9.1+ | |||||||||||||||||
Supported platforms | ||||||||||||||||||
Server:
| Protocols:
| SecureAuth IdP Adaptive Authentication IP Checking feature:
| ||||||||||||||||
Port settings | ||||||||||||||||||
Inbound:
| ||||||||||||||||||
RADIUS VPN and product support | ||||||||||||||||||
Supported RADIUS clients:
| Other compatible RADIUS clients include:
Contact SecureAuth Professional Services with inquiries. | To configure a Palo Alto Networks GlobalProtect VPN to send the client IP to SecureAuth IdP RADIUS server:
| ||||||||||||||||
RADIUS client configuration | ||||||||||||||||||
Though not all RADIUS clients are configured in the same manner, the following basic connectivity parameters must be configured on RADIUS clients to be used with SecureAuth IdP:
NOTE: A valid certificate must be installed if using NetMotion Wireless VPN. Sample RADIUS authentication server configuration:
| ||||||||||||||||||
SecureAuth IdP RADIUS server v19.06 installation | ||||||||||||||||||
Upgrade If SecureAuth RADIUS v1.0.x is currently installed, review the upgrade instructions in the Install SecureAuth IdP RADIUS server v19.06 before installing the newer version of RADIUS. If SecureAuth IdP RADIUS server v2.0.x - v2.5.x is currently installed, use the install instructions in Install SecureAuth IdP RADIUS server v19.06 to upgrade while retaining the current configuration settings. New installation If installing SecureAuth IdP RADIUS server v19.06 for the first time on the designated appliance, follow the install instructions in the installation guide. SecureAuth IdP RADIUS logs for troubleshooting See SecureAuth IdP RADIUS server logs for information about using the RADIUS logs for troubleshooting. |
Adaptive Authentication
If Adaptive Authentication is used with the user group check feature enabled, RADIUS responds accordingly in these login failure scenarios based on the authentication workflow.
Note that the following workflows do not correlate exactly to the workflows in SecureAuth IdP. Some of the following workflows are not included in SecureAuth IdP "Login Screen Options" and vice versa. For example, RADIUS does not have an option for "Username only" (while SecureAuth IdP does) and SecureAuth IdP does not have an option for "PIN + OTP" (while RADIUS does).
- Workflow 1 = Password | Second Factor
- Workflow 2 = Password & Mobile Login Request (Approve / Deny)
- Workflow 3 = Password only
- Workflow 4 = One-Time Passcode (TOTP/HOTP) only
- Workflow 5 = One-Time Passcode / Password
- Workflow 6 = Password | One-Time Passcode (TOTP/HOTP)
- Workflow 7 = One-Time Passcode (TOTP/HOTP) | Password
- Workflow 8 = Username | Second Factor
- Workflow 9 = Username | Second Factor | Password
- Workflow 10 = PIN + OTP
- Workflow 11 = Password & One-Time Passcode (TOTP/HOTP)
- Workflow 12 = Yubico OTP only
- Workflow 13 = Password | Yubico OTP
Login failure scenario | End-user experience from RADIUS | End-user experience from RADIUS |
---|---|---|
Hard stop; refuse authentication request | Login failed message received | Login failed message received |
Step up, require two-factor authentication | Prompt received for second authentication factor | Login request fulfilled |
Step down, skip two-factor authentication | Second authentication factor skipped; login request fulfilled | Login request fulfilled |
Resume authentication workflow | Prompt received for second authentication factor | Login request fulfilled |
Skip to post-authentication | Second authentication factor skipped; login request fulfilled | Login request fulfilled |
No failure | Prompt received for second authentication factor | Login request fulfilled |
SecureAuth IdP RADIUS server logs
Enable logs
Set up logs for the SecureAuth IdP RADIUS server by completing the following:
- Download the following log configuration file, and place it in a temporary folder on the SecureAuth RADIUS server.
- Rename C:\idpRADIUS\bin\conf\log4j2.xml so you can use it to disable logging when you finish debugging.
The paths you use might be different, depending on your RADIUS server version or the destination folder selected when you installed the RADIUS server. The following are examples of default paths:- C:\idpRADIUS\bin\conf\log4j2.xml
- C:\Program Files (x86)\SecureAuth Corporation\SecureAuth IdP RADIUS Agent\bin\conf\log4j2.xml
- C:\Program Files\SecureAuth Corporation\SecureAuth IdP RADIUS Agent\bin\conf\log4j2.xml
- Place the downloaded log4j2.xml file in the *\bin\conf folder, which is the same folder used in step 2.
- Run the services.msc application, then restart the SecureAuth RADIUS service.
- Replicate the issue you have encountered.
- Find log files stored in *\bin\Logs\saRadiusServer.log.
- Receive assistance with resolving the issue by forwarding log files to the SecureAuth Support team when you create a support ticket.
- Restore the original log4j2.xml after debugging is completed.
Trace level logging uses a substantial amount of disk space and can create disk space issues over time.
Sample logs for different RADIUS failover scenarios
Failover to a SecureAuth IdP RADIUS backup server is configured under Step B: IdP Realms configuration, Add IdP Realm in the Configuration guide - v19.06 - SecureAuth IdP RADIUS server.
Release notes
New features and enhancements
Version: 19.06
Release date: July 11, 2019
Compatibility: SecureAuth IdP v9.1.x - v9.3.x, and the SecureAuth® Identity Platform v19.07
RAD-241 | SecureAuth RADIUS supports MS-CHAPv2, as documented in MS-CHAPv2 and RADIUS (SP-initiated) for Cisco and Netscaler configuration guide. |
RAD-258 | SecureAuth RADIUS masks all phone numbers consistently with asterisks, regardless of the format in which they are saved in Active Directory. |
RAD-259 | SecureAuth RADIUS supports Yubico OTP token as a second-factor passcode, in the "Username | Second Factor" and "Username | Second Factor | Password" workflows. |
RAD-271 | SecureAuth RADIUS supports the "Yubico OTP only" workflow, where end users can use the YubiKey code as the password. |
RAD-272 | SecureAuth RADIUS supports Yubico OTP token as the password or passcode, in the "Password | Yubico One-Time Passcode" workflow. |
RAD-273 | SecureAuth RADIUS now uses the AdoptOpenJDK 8 Java Runtime Environment (JRE), and no longer uses the Oracle JRE. |
RAD-301 | SecureAuth RADIUS supports PAM RADIUS version pam_radius-1.4.0-2.el7.x86_64 and earlier. |
Resolved issues
RAD-195 | Toast (pop-up) messages in Realms and Clients tabs are implemented and work correctly. |
RAD-257 | Clicking the Add Attribute text in the Static Value Mapping section of the RADIUS Client tab no longer adds a custom attribute to the page. |
RAD-261 | The Import Settings and Export Settings buttons were moved into the RADIUS Server Settings section on the Settings tab. |
RAD-262 | If end users receive a login screen after they have logged in with a 2FA passcode method of SMS/Text, Voice, Email, or Send passcode to mobile app, a guidance message in the log file explains the following workaround for administrators: In order to avoid errors with 2FA passcode methods, ensure that the following key is removed from the SecureAuth Identity Platform Web Config file in the appSettings section: <add key="OTPFieldMapping" value="<SecureAuth IdP Profile Property>" /> |
RAD-265 | Connections to disabled realms fail as expected because the realm is inactive. |
RAD-268 | The first created IdP realm is automatically assigned to the default RADIUS client. |
RAD-270 | End users receive better error messages with guidance when using NetMotion to import the PEAP certificate for a machine. |
RAD-282 | Administrators can create a valid personal exchange format (PFX) certificate without a password and import it into a RADIUS Protected Extensible Authentication Protocol (PEAP) page. |
RAD-295 | End user cannot connect to VPN using a deleted shared secret value. |
RAD-300 | The "Password | One-Time Passcode (TOTP/HOTP) or Second Factor" workflow was renamed to "Password | Second Factor". |
RAD-302 | On Firefox Quantum versions 67.0.2 and 67.0.4, if end users set an attribute with invalid characters, they can remove the attribute row without saving or leaving the page. |
RAD-304 | Administrators cannot select the installation path in an upgrade process. The directory can be selected only in a new installation. (Documentation was corrected.) |
RAD-306 | After converting SecureAuth RADIUS from SAM to UPN by adding a domainUPNSuffixes.properties file, end users can now log into a RADIUS Client, with PEAP as its authentication schema, by using a UPN-format username. |
Known issue
RAD-485 | Invalid characters in user IDs sent to the RADIUS server cause a RADIUS server failure. Workaround: Ensure that user IDs contain the following valid characters only:
|
Next step...
Install SecureAuth IdP RADIUS server v19.06
Related documentation
Installation guide - v19.06 - SecureAuth IdP RADIUS server
Configuration guide - v19.06 - SecureAuth IdP RADIUS server
End-user experience - v19.06 - SecureAuth IdP RADIUS server
Prior version
SecureAuth IdP RADIUS server v2.5 integration guide
Installation guide - v2.5 - SecureAuth IdP RADIUS server